JEDI - Many-to-Many End-to-End Encryption and Key Delegation for IoT

JEDI - Many-to-Many End-to-End Encryption and Key Delegation for IoT

USENIX via YouTube Direct link

Intro

1 of 15

1 of 15

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

JEDI - Many-to-Many End-to-End Encryption and Key Delegation for IoT

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 IoT Systems use Decentralized Delegation
  3. 3 Joining Encryption and Delegation for lot
  4. 4 Decentralized Delegation CECF01, AKCCK17
  5. 5 Preliminary JEDI Design Using ABE
  6. 6 Encrypt Using Current Time
  7. 7 Time is Another Hierarchy
  8. 8 Hamilton Platform [KACKZMC18]
  9. 9 Energy Cost of ABE
  10. 10 Choosing a More Efficient Encryption Scheme
  11. 11 How JEDI Uses WKD-IBE
  12. 12 Cryptographic Improvements to WKD-IBE
  13. 13 Implementation
  14. 14 Estimated Battery Life on a Hamilton Sensor
  15. 15 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.